LEADER 02877nam 2200625 a 450 001 9910778936803321 005 20230120011033.0 010 $a1-78402-345-0 010 $a1-283-43424-5 010 $a9786613434241 010 $a0-12-415910-9 035 $a(CKB)2550000000084153 035 $a(EBL)858728 035 $a(OCoLC)776108210 035 $a(SSID)ssj0000599224 035 $a(PQKBManifestationID)12201730 035 $a(PQKBTitleCode)TC0000599224 035 $a(PQKBWorkID)10596276 035 $a(PQKB)11385241 035 $a(Au-PeEL)EBL858728 035 $a(CaPaEBR)ebr10525038 035 $a(CaONFJC)MIL343424 035 $a(CaSebORM)9780124158153 035 $a(MiAaPQ)EBC858728 035 $a(EXLCZ)992550000000084153 100 $a20111024d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aHandbook on securing cyber-physical critical infrastructure$b[electronic resource] /$fSajal Das, Krishna Kant, Nan Zhang (editors) 205 $a1st edition 210 $aWaltham, Mass. $cElsevier/Morgan Kaufmann$d2012 215 $a1 online resource (849 p.) 300 $aDescription based upon print version of record. 311 $a0-12-415815-3 320 $aIncludes bibliographical references and index. 327 $apt. 1. Theoretical foundations -- pt. 2. Security for wireless mobile networks -- pt. 3. Security for sensor networks -- pt. 4. Platform secruity -- pt. 5. Cloud computing and data security -- pt. 6. Event monitoring and situation awareness -- pt. 7. Policy issues in security management -- pt. 8. Security in real-world systems. 330 $a The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports 606 $aComputer networks$xSecurity measures$vHandbooks, manuals, etc 606 $aComputer security$vHandbooks, manuals, etc 615 0$aComputer networks$xSecurity measures 615 0$aComputer security 676 $a005.8 701 $aDas$b Sajal K$0861135 701 $aKant$b Krishna$0771952 701 $aZhang$b Nan$f1982-$01549980 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910778936803321 996 $aHandbook on securing cyber-physical critical infrastructure$93808432 997 $aUNINA